Escolar Documentos
Profissional Documentos
Cultura Documentos
Lab M a n u a l
H a c k in g W e b A p p lic a t io n s M o d u le 1 3
H a c k i n g
W e b
Applications
Hacking web app lic ations r e f e r st o canying out unauthoriseda c c e s s of a website or the website d e t a i l s .
I C ON KEY
Lab Scenario
A web application is an application that is accessed by users over a network such as the Internet or an intranet. The term may also mean a computer software application that is coded 111 a browser-supported programming language (such as JavaScript, combined with a browser-rendered markup language like HTML) and reliant on a common web browser to render the application executable.
Web applications are popular due to the ubiquity of web browsers, and the convenience of using a web browser as a client. The ability to update and maintain web applications without distributing and installing software on potentially thousands of client computers is a key reason for their popularity, as is the inherent support for cross-platform compatibility. Common web applications include webmail, online retail sales, online auctions, wikis and many other functions.
Workbook re\
Web hacking refers to exploitation of applications via HTTP which can be done by manipulating the application via its graphical web interface, tampering the Uniform Resource Identifier (URI) or tampering HTTP elements not contained 111 the URL Methods that can be used to hack web applications are SQL Injection attacks. Cross Site Scripting (XSS), Cross Site Request Forgeries (CSRF), Insecure Communications, etc.
As an expert E th ic al H a c k e r and S e c u rity A d m in is trato r, you need to test web applications for cross-site scripting vulnerabilities, cookie liijackuig, command injection attacks, and secure web applications from such attacks.
Lab Objectives
The objective of tins lab is to provide expert knowledge ot web application vulnerabilities and web applications attacks such as:
Lab Environment
To earn out the lab, you need:
A computer running W in d o w s
S e rv e r 2 0 1 2
Ethical Hacking and Countermeasures Copyright by EC-Council A ll Rights Reserved. Reproduction is Stricdy Prohibited.
Lab Duration
Tune: 50 Minutes
Lab Tasks
Recommended labs to assist you 111 web application: Parameter tampering attacks Cross-site scripting (XSS or CSS) Web spidering Website vulnerability scanning using Acunetix WVS
Lab Analysis
Analyze and document the results related to the lab exercise. Give your opinion on your targets security posture and exposure.
P LE A S E
TA LK
TO
Y O U R IN S T R U C T O R IF YO U R E L A T E D TO T H IS LAB.
H A V E
Q U E ST IO N S
Ethical Hacking and Countermeasures Copyright by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited.
H a c k i n g
W e b
Applications
Lab Scenario
According to die DailyNews, Cyber-crime targeted 111 new ICT policy; the government is reviewing the current Information and Communication Technology (ICT) policy in quest to incorporate other relevant issues, including addressing cyber-crime, reported to be on the increase. Many websites and web applications are vulnerable to security threat including the government's and non-government's websites, we are therefore cautious to ensure that die problem is checked, Mr. Urasa said. Citing some of the reasons leading to hacking, he said inadequate auditing 111 website and web applications caused by lack of standard security auditing were among problems diat many web developers faced. As an expert E th ic a l H a c k e r and S e c u rity A d m in is trato r, you should be aware of all the methods diat can be employed by an attacker towards hacking web applications and accordingly you can implement a countermeasure for those attacks. Hence, 111 diis lab you will learn how to hack a website with vulnerabilities.
Lab Objectives
The objective of tins lab is to help students learn how to test web applications for vulnerabilities.
111 tins lab you will perform:
Lab Environment
To earn out die lab, you need: Powergym website is located at D :\CEH -Tools\C EHv8
P re re q u isites\W eb sites \P o w erg y m Lab
Rim this lab 111 Windows Server 2012 host machine Microsoft SQL server 2012 A web browser with an Internet connection
http: //localhost/ powergym
Lab Duration
Time: 20 Minutes
Lab Tasks
Web p a r a m e te r ta m p e rin g attacks involve the m a n ip u la tio n of parameters exchanged between a client and a server 111 order to m o d ify application data, such as user credentials and permissions, price, and quantity of products. 1. To launch a web browser move your mouse cursor to lower left corner of your desktop, and click S ta rt
H U Parameter tampering attack exploits vulnerabilities in integrity and logic validation mechanisms that may result in X SS, SQ L injection.
2. From start menu apps click 011 any browser app to launch. 111 diis lab we are using F irefo x browser
Ethical Hacking and Countermeasures Copyright by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
Start M a r a g e r ~ , *
e
Parameter tampering can be employed by attackers and identity thieves to obtain personal or business information regarding the user surreptitiously.
A d m in is tra to r p o w e n n e il C h r o m e m * C o m r d 1F P m H ir e fw
W
M jp V M a n a g e r * S Q L S e r v e r S l U IT *
P 0 n p <
3. Type http:/ /localhost/powergym 111 die address bar of the web browser, and press E n te r 4. The H o m e
p ag e
of P o w e rg ym appears
Countermeasures specific to the prevention o f parameter tampering involve die validation o f all parameters to ensure that they conform to standards concerning minimum and maximum allowable length, allowable numeric range, allowable character sequences and patterns, whether or not the parameter is actually required to conduct the transaction in question, and whether or not null is allowed.
a m em ber
address bar, try to tamper die parameter by entering various keywords. Perform a T ria l and Error on diis website
P a rtin k in
Ethical Hacking and Countermeasures Copyright by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
CO A web page contains both text and H T M L markup that is generated by the server and interpreted by die client browser. Web sites diat generate only static pages are able to have full control over how the browser interprets these pages. Web sites diat generate dynamic pages do not have complete control over how their outputs are interpreted by die client.
Now tamper with the parameters id= S arah P a rtin k to id=R ich ard Pete rs o n 111 die address bar and press E n ter You get die search results for R ichard P ete rs o n widiout acUially searching S arah P a rtin k 111 search field. This process of changing the id v a lu e and getting die result is known as p a ra m e te r ta m p e rin g
10. You have browsed a site to which you dont have login ID and access to view details of products. You have performed dus by p a ra m e te r
tam p e rin g
Ethical Hacking and Countermeasures Copyright by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited.
task
C ross-S ite
d y n a m ic a lly
(XSS or CSS) attacks exploit vulnerabilities 111 generated web pages. This enables m a lic io u s attackers to inject clientside scnpts into web pages viewed by odier users.
W eb c ro s s-s ite sc rip tin g
\\
12. The h om e
ot Powergvm appears
Cross-site scripting (X SS) is a type o f computer security vulnerability, typically found in web applications, that enables malicious attackers to inject client-side script into web pages viewed by other users.
p ag e
15. Enter s a m as U s e r n a m e and t e s t ' as P assw o rd tields and click 011 Login to log into die website
respective
Ethical Hacking and Countemieasures Copyright by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
c a Attackers inject JavaScript, VBScript, ActiveX, H T M L, or Flash into a vulnerable application to fool a user in order to gather data. (Read below for further details) Everything from account hijacking, changing o f user settings, cookie theft/poisoning, and false advertising is possible.
16. After you log 111 to the website, hud ail input field page where you can enter cro s s-s ite scrip tin g. 111 diis lab, die c o n ta c t page contains an input held where yon can enter cross-site scnpt 17. After logging 111 it will automatically open c o n ta c t page
Most modern web applications are dynamic in nature, allowing users to customize an application website through preference settings. Dynamic web content is then generated by a server that relies on user settings. These settings often consist o f personal data that needs to be secure.
18. On die contact page, enter your login name (or any name) 111 Y o u r n am e held 19. Enter any email in email address held. 111 die Y o u r m e ss ag e held, enter diis cross-site script, Chris, I love yo u r G YM ! < s c rip t> a le rt("Y o u h a v e been h ack ed ")< /s crip t> and click S u bm it 20. Oil diis page, you are te s tin g for cross-site scripting vulnerability
Ethical Hacking and Countermeasures Copyright by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
Cross-site Scripting is among the most widespread attack methods used by hackers. It is also referred to by the names X SS and CSS.
CwUcl trio
.t'
Join O ur Club
21. You have successfully added a m a lic io u s s c rip t 111 die contact page. The comment widi malicious link is sto re d on die server.
Cross-site scripting (also known as X SS) occurs when a web application gathers malicious data from a user. The data is usually gathered in the form o f a hyperlink which contains malicious content widiin it. The user most likely clicks on diis link from another website, instant message, or simply just reading a web board or email message.
22. Whenever any m e m b e r comes to die contact page, die a le rt soon as die web page is loaded.
* 1-00*<
pops up
as
P ft
D *j
Ethical Hacking and Countermeasures Copyright by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited.
Lab Analysis
Analyze and document the results related to die lab exercise. Give your opinion 011 your targets secuntv posture and exposure. Tool/U tility Powergym Website Information Collected/Objectives Achieved Parameter tampering results Cross-site script attack 011 website vulnerabilities
P LE A S E
TA LK
TO
Y O U R IN S T R U C T O R IF Y O U R E L A T E D TO T H IS LAB.
H A V E
Q U E ST IO N S
Questions
1. Analyze how all the malicious scnpts are executed 111 a vulnerable web application. 2. Analyze if encryption protects users from cross-site scripting attacks. 3. Evaluate and list what countermeasures you need to take to defend from cross-site scripting attack. Internet Connection Required Yes Platform Supported El Classroom 0 iLabs 0 No
Ethical Hacking and Countermeasures Copyright by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited.
W e b s i t e Vulnerability S c a n n i n g U s i n g A c u n e t i x W V S A.cunetix web v u l n e r a b i l i t y scanner (IP1 r S) broadens the scope of v u l n e r a b i l i t y scanning by introducing h i gh ly advanced h e u r i s t i cand ri go rous t e c h n o l o g i e sdesignedt o tackle th e complexities of today'sweb-based environments.
con
key
Lab Scenario
With the emergence of Web 2.0, increased information sharing through social networking and increasing business adoption of the Web as a means of doing business and delivering service, websites are often attacked directly. Hackers either seek to compromise die corporate network or die end-users accessing the website by subjecting them to drive-by downloading As many as 70% of web sites have vulnerabilities diat could lead to die theft of sensitive corporate data such as credit card information and customer lists. Hackers are concentrating dieir efforts on web-based applications - shopping carts, forms, login pages, dynamic content, etc. Accessible 24/7 from anywhere 111 the world, insecure web applications provide easy access to backend corporate databases and allow hackers to perform illegal activities using the compromised site. Web application attacks, launched on port 80/443, go straight dirough the firewall, past operating system and network level security, and light 111 to the heart of the application and corporate data. Tailor-made web applications are often insufficiendv tested, have undiscovered vulnerabilities and are therefore easy prey for hackers. As an expert P e n e tra tio n T e s te r, find out if your website is secure before hackers download sensitive data, commit a crime using your website as a launch pad, and endanger vour business. You may use A c u n e tix W eb V u ln e ra b ility S c a n n e r (WYS) diat checks the website, analyzes the web applications and finds perilous SQL injection. Cross site scnptmg and other vulnerabilities that expose the online business. Concise reports identify where web applications need to be fixed, thus enabling you to protect your business from impending hacker attacks!
Web exercise
^ otkbook review
Ethical Hacking and Countermeasures Copyright by EC-Council A ll Rights Reserved. Reproduction is Stricdy Prohibited.
Lab Objectives
& Too ls
The objective of tins kb is to help students secure web applications and te s t websites for vulnerabilities and threats.
Lab Environment
To perform the lab, you need:
You can also download the latest version of A c u n e tix v u ln e ra b ility s c a n n e r trom the link http:/ / www.acunetix.com / vulnerability-scanner
111
W eb
la te s t v e rs io n ,
A web browser with an Internet connection Microsoft SQL Server / Microsoft Access
Lab Duration
Time: 20 Minutes
At a high level, Web application security draws on the principles of application security but applies them specifically to Internet and Web systems. Typically web applications are developed using programming languages such as PHP. Java EE, Java, Python, Ruby, ASP.NET, C#, \ 13.NET or Classic ASP.
m.
TASK
Lab Tasks
1. Follow the wizard-driven installation steps to install A c u n e tix
V u ln e r a b ility S c a n n e r. W eb
2. To launch A c u n e tix W eb V u ln e r a b ility S c a n n e r move your mouse cursor to lower left corner of your desktop and click S ta r t
Ethical Hacking and Countemieasures Copyright by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited.
The Executive report creates a summary o f the total number o f vulnerabilities found in every vulnerability class. This makes it ideal for management to get an overview o f the security of the site without needing to review technical details.
3.
111
A c u n e tix W V S S c a n W iza rd
app to launch
A d m in is tra to r c lw c im < 9
M j/ llld
H ) p 6 f v M a n a g e r
A ajre w W /S 8
r=
w e rrr
<
E
S tu d o * * IX
b z
C M isam..
E 3
F IG U R E 2.2: Launching Acunetix W V S Scan Wizard app The scan target option, Scan single website scans a single website.
The Scan Target option scans using saved crawling results. I f you previously performed a crawl on a website and saved the results, you can launch a scan against the saved crawl, instead o f crawling the website again.
ca
The S c a n W iz a rd of Acunetix Web Vulnerability Scanner appears. You can also start Scan Wizard by clicking F ile -> N e w -> N e w W e b S ite S c a n or clicking 011 N e w S c a n 011 the top right hand ot the Acunetix WVS user interface.
Ethical Hacking and Countermeasures Copyright by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited.
6.
Check the type of Scan you want to perform, input the website URL, and click on N e x t > to continue
Scan Type
Select whether you want to scan a angle website or analyze the results of a previous ciawl.
S
In Scan Option, Extensive mode, die crawler fetches all possible values and combinations o f all parameters.
Here you can scan a single websrfe In case you want to scan a single web appfccation and not the whole site you can enter the ful path below The appfcabon supports HTTP and HTTPS websites.
If you saved the site structure using the site cravrfer tool you can use the saved results here. The scan will load this data from the We file instead of ctawing crawfing the site again.
zi
If you want to scan a 1st of websites, use the Aanetw Scheduler You can access the scheduler interface by cfcckng the Ink below http: /Axalhost: 8181 /
H e x t>
F IG U R E 2.4: Acunetix W V S Scan Wizard Window
9.
111 O p tio n s
I I
Scan Type
Options
Target Login
Scanning options
Scannng profile w i enable/disable deferent tests (or group 0#tests) from the test database.
Scanning proMe:
Default
Scanning settngs allow you to adjust scannng behavior to the current scan(s).
Scan settings:
Default
A *
These options will defne the behaviour of the crawler for the current scans. If yc the general crawler behaviour, you should go to settngs. After crawling jet me choose the fiet to scan
The scan target option scans a list o f target websites specified in a plain text file (one target per line).
ca
acunetix
F ilen am e: |
\ 3
< Back | Next > | | Cancel
N ext
Ethical Hacking and Countermeasures Copyright by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
The scan target option scans a specific range o f IP s (e.g.192.168.0.10192.168.0.200) and port ranges (80,443) for available target sites. Port numbers are configurable.
The other scan options which you can select from the wizard are: Manipulate H T T P headers Enable Port Scanning
11.
111 L ogin
7 Note: I f a specific web technology is not listed under Optimize for the technologies, it means that there are no specific tests for it.
F in ish
Ethical Hacking and Countemieasures Copyright by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
Finish
After analyzing the website responses, we have compied a 1st of recommendations foe the current scan.
AcuSensor is enabled on Acunetix W V S but seems not to be configured on the target server(s). Instal the sensor on your target server(s). If the sensor is already instaled, set the correct password for the serverfs) by cicking on customize. You can verify if a specific server responds by using the test button from the sensor settings.
y=y In Scan Options, Quick mode, the crawler fetches only a very limited number o f variations o f each parameter, because they are not considered to be actions parameters.
Case insensitive server It seems that the server is usrtg CASE nsensitrve URLs If you want to set case insensitive crawling check below, otherwise value from settings wd be used
Addrtional hosts detected Some additional hosts were detected Check the ones you want to nclude in the scan.
13. Click on
O K 111 Limited
L im it e d X S S S c a n n in g
h i Scan Option, Heuristic mode, the crawler tries to make heuristic decisions on which parameters should be considered as action parameters and which
This version w ill only scan for C rossS ite Scripting vulnerabilities! O nly the full version of AcunetixW V Sw ill scan for all vulnerabilities.
OK
14. Acunetix Web Vulnerability Scanner s ta r ts scanning the input website. During the scan, s e c u rity a le r ts that are discovered on the website are listed 111 real time under die Alerts node 111 the S c a n R e s u lts window. A node Site Structure is also created, which lists folders discovered.
5 * 5*|, JJJ Ug *Sr
Note: I f the scan is launched from saved crawl results, in die Enable AcuSensor Technology option, you can specify to use sensor data from crawling results without revalidation, not to use sensor data from crawling results only, or else to revalidate sensor data. F IG U R E 2.10: Acunetix W V S Main Window after Scan
L i ___ I
....
Ethical Hacking and Countermeasures Copyright by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
15. The Web Alerts node displays all vulnerabilities found on the target website.
I f you scan an H T T P password-protected website, you are automatically prompted to specify the username and password. Acunetix W V S supports multiple sets of H T T P credential for the same target website. H T T P authentication credentials can be configured to be used for a specific website/host, U R L, or even a specific file only.
16. Web Alerts are sorted into four severity levels: High Risk Alert Level 3 Medium Risk Alert Level 2 Low Risk Alert Level 1 Informational Alert 17. The number of vulnerabilities detected is displayed 111 brackets () next to the alert categories.
! k liL.llllli m . 1 1 .llll.llII. ., i r i.
2 ( . | r r .1 - | A 4 * y so ru u .
m a tp
d j\ A t t
TASK
18. When a scan is complete, you can s a v e th e s c a n hie for analysis and comparison at a later stage. 19. To s a v e the scan results, click F ile -> S a v e desired location and save the scan results. 20.
S ta tis tic a l R e p o rts
re s u lts
to an external Select a
S c a n R e s u lts .
allow you to gather vulnerability information from the results database and present periodical vulnerability statistics.
21. Tins report allows developers and management to track security changes and to compile trend analysis reports.
Statistical reports allow you to gather vulnerability information from the results database and present periodical vulnerability statistics. This report allows developers and management to track security changes and to compile trend analysis reports.
Ethical Hacking and Countermeasures Copyright by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
N ote: 111 tins kb we have used trial version so we could not able the save die results. To save die result it Acunetix WVS should be licensed version
G en eratin g R epo rt
The developer report groups scan results by affected pages and files, allowing developers to quickly identify and resolve vulnerabilities. The report also features detailed remediation examples and best-practice recommendations for fixing vulnerabilities.
ca
A c u n e tix W V S R e p o rte r. v ie w ,
24. The Report Viewer is a standalone application that allows you to s a v e , e x p o rt, and p rin t g e n e ra te d re p o rts . The reports can be exported to PDF, HTML, Text, Word Document, or BMP.
25. To generate a report, follow the procedure below. Select the type of report you want to generate and click on R e p o rt W iza rd to launch a wizard to assist you. 26. If you are generating a c o m p lia n c e re p o rt, select the type of compliance report. If you are generating a c o m p a ris o n re p o rt, select the scans you would like to compare. It you are generating a monthly report, specify the month and year you would like to report. Click N e x t to proceed to the next step. 27. Configure the scan filter to list a number ot specific saved scans or leave the default selection to display all scan results. Click N e x t to proceed and select the specific scan for which to generate a report.
The Vulnerability report style presents a technical summary o f the scan results and groups all the vulnerabilities according to their vulnerability class. Each vulnerability class contains information on the exposed pages, die attack headers and the specific test details
28. Select what properties and details the report should include. Click G e n e r a te to finalize the wizard and generate the report. 29. The
W V S R e p o rte r
Developer Shows affected pages and files Executive Provides a summary of security of the website Vulnerability Lists vulnerabilities and their impact Comparison Compares against previous scans Statistical Compiles trend analysis
Ethical Hacking and Countemieasures Copyright by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited.
The Scan Comparison report allows the user to track the changes between two scan results. H ie report documents resolved and unchanged vulnerabilities and new vulnerability details. The report style makes it easy to periodically track development changes for a web application.
Tins is sample report, as tiial version doesnt support to generate a report of scanned website
N ote:
Lab Analysis
Analyze and document die results related to die lab exercise. Give your opinion on your targets security posture and exposure. Tool/Utility Acunetix Web Vulnerability Scanner Information Collected/Objectives Achieved Cross-site scripting vulnerabilities verified
P LE A S E
TA LK
TO
Y O U R IN S T R U C T O R IF Y O U R E L A T E D TO T H IS LAB.
H A V E
Q U E ST IO N S
Questions
1. Analyze how you can schedule an unattended scan. 2. Evaluate how a web vulnerability scan is performed from an external source. Will it use up all your bandwidth? 3. Determine how Acunetix WVS crawls dirough password-protected areas. Internet Connection Required 0 Yes Platform Supported 0 Classroom D iLabs No
Ethical Hacking and Countenneasures Copyright by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.